Not only your employees, but also some of your systems generate sensitive data and large files that need to be exchanged securely with contacts outside or inside your company.
Even though these systems can be linked to e-mail, there are many files and data that you probably don’t want to exchange unprotected or that are simply too large for sending them this way.
Automate your file transfers for mass distribution, one to many or many to many.
Using the Cryptshare automation tools, file transfers can take place as time-triggered or event-triggered actions to single recipients or to distribution lists.
These tools are used for distributing commercial materials, statements of account, batch clinical records, contract changes and so on.
When large volumes of data need to be sent, but security and compliance issues exist, Cryptshare solves these issues.
Typical use cases
for the Cryptshare automation tools include:
To connect your systems to Cryptshare and the realization of a safe, automatic information dispatch you have different options:
Cryptshare Robot is a sleek command line tool, which allows you to initiate the automatic transfer of files out of the file system. The use of Cryptshare Robot requires no advanced programming skills. Scripting expertise at operating system level is sufficient. To Cryptshare Robot documentation.
Cryptshare .NET API
The .NET API allows a deep integration of the secure communications functions of Cryptshare into applications based on MS.NET languages. To .NET API documentation.
(.NET development knowledge required)
Cryptshare JAVA API
The JAVA API allows a deep integration of the secure communications functions of Cryptshare into applications based on Java. To Java API documentation.
(Java development knowledge required).
Interface for automatic retrieval of data
We have further extended the capabilities for automatic retrieval of files and messages from the Cryptshare Server. You can now retrieve data with the help of a script or a program without having to receive and evaluate an incoming notification e-mail first.
An e-mail address needs to be defined to address the device that should be able to receive automatically (e.g. email@example.com). This e-mail address then needs to be verified only once on the device. To do that the device does not necessarily have to be able to receive e-mails.
The code can be received on a different way and be inserted manually on the device.
The device can poll the Cryptshare server if there are new transfers ready to be retrieved for this e-mail address and can download them automatically. An incoming e-mail serving as a trigger is no longer necessary.
After the download, the data can be automatically processed further by the receiving device.
Using this feature, you can now spread master data files onto your POS systems, provide production machines with new data sets from afar or receive and automatically process measurement and analysis data from your clients. Cryptshare helps you to master these requirements and put them into practice - easily, securely and with a full audit trail.